/system/keymaster/ |
D | keymaster_enforcement_test.cpp | 523 token.challenge = 99; in TEST_F() 538 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set, op_params, token.challenge, in TEST_F() 546 token.challenge = 99; in TEST_F() 563 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set, op_params, token.challenge, in TEST_F() 568 token.challenge, false /* is_begin_operation */)); in TEST_F() 575 token.challenge = 99; in TEST_F() 591 token.challenge + 1 /* doesn't match token */, in TEST_F() 599 token.challenge = 99; in TEST_F() 614 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set, op_params, token.challenge, in TEST_F() 619 token.challenge, false /* is_begin_operation */)); in TEST_F() [all …]
|
D | keymaster_enforcement.cpp | 465 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { in AuthTokenMatches() 466 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); in AuthTokenMatches()
|
D | android_keymaster_test.cpp | 3544 static bool verify_attestation_record(const string& challenge, in verify_attestation_record() argument 3580 EXPECT_EQ(challenge.length(), att_challenge.data_length); in verify_attestation_record() 3581 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data, challenge.length())); in verify_attestation_record()
|
/system/gatekeeper/ |
D | gatekeeper_messages.cpp | 134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument 137 this->challenge = challenge; in VerifyRequest() 161 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize() 166 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize() 167 buffer += sizeof(challenge); in nonErrorSerialize() 184 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize() 185 payload += sizeof(challenge); in nonErrorDeserialize()
|
D | gatekeeper.cpp | 153 user_id, authenticator_id, request.challenge); in Verify() 219 uint64_t challenge) { in MintAuthToken() argument 226 token->challenge = challenge; in MintAuthToken()
|
/system/tpm/attestation/common/ |
D | attestation_ca.proto | 132 // The challenge data (as in challenge-response) generated by the server. 139 // A string for the client to sanity check a legitimate challenge. 144 // challenge may be replayed. 148 // The response data (as in challenge-response) generated by the client. 155 // The original challenge data. 156 optional SignedData challenge = 1; field 158 // prevents a caller from using a challenge to sign arbitrary data. 183 // with a random challenge. The SignedPublicKeyAndChallenge specification is
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper.cpp | 123 int TrustyGateKeeperDevice::Verify(uint32_t uid, uint64_t challenge, in Verify() argument 137 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in Verify() 216 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 226 return convert_device(dev)->Verify(uid, challenge, enrolled_password_handle, in verify()
|
D | trusty_gatekeeper.h | 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, 112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
/system/core/gatekeeperd/ |
D | SoftGateKeeperDevice.cpp | 72 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in verify()
|
D | gatekeeperd.cpp | 197 virtual int verifyChallenge(uint32_t uid, uint64_t challenge, in verifyChallenge() argument 219 ret = device->verify(device, uid, challenge, in verifyChallenge() 226 ret = soft_dev.verify(uid, challenge, in verifyChallenge() 237 ret = soft_device->verify(uid, challenge, in verifyChallenge()
|
D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
D | IGateKeeperService.cpp | 110 uint64_t challenge = data.readInt64(); in onTransact() local 125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle, in onTransact()
|
D | IGateKeeperService.h | 85 virtual int verifyChallenge(uint32_t uid, uint64_t challenge,
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 140 uint64_t challenge, 150 uint64_t challenge; member
|
D | gatekeeper.h | 180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
|
/system/security/keystore/ |
D | auth_token_table.cpp | 111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization() 168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); in MarkCompleted() 181 operation_completed_(token_->challenge == 0) { in Entry()
|
/system/security/keystore/tests/ |
D | auth_token_table_test.cpp | 69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0, in make_token() argument 75 token->challenge = challenge; in make_token()
|
/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 88 ASSERT_EQ((uint64_t) 1, auth_token->challenge); in TEST()
|
/system/gatekeeper/tests/ |
D | gatekeeper_messages_test.cpp | 182 ASSERT_EQ((uint64_t) 1, deserialized_msg.challenge); in TEST()
|
/system/connectivity/shill/doc/ |
D | service-api.txt | 959 challenge/response protocol. See the 960 "--static-challenge" option in the OpenVPN 990 single-use token to be used during the static challenge
|